If I have a poor PRNG, could a cryptographically secure hash function make a better output?
Say the PRNG can produce as much numbers as you wish, reasonably random, but not good enough to be used in ...

How much more entropy gives a Hardware Random Number Generator or True Random Number Generator compared to a Pseudo Random Number Generator?
I know it depends on which TRNG is used, but I'm thinking ...

I am using randomsound because I thought it would be a good idea to inject some additional entropy into the entropy pools of my linux machines (clearly those machines have a corresponding sound card).
...

I collect entropy from the following sources:
system_entropy = System provided crypto entropy stream (CryptGenRandom on Windows)
user_entropy = User-provided entropy - in a form of a byte stream of ...

If you took a hashing algorithm for example MD5 and repeatedly passed the output hash back into the algorithm an arbitrarily large number of times would you eventually end up with one unique hash?
My ...

Suppose i have a 128 bits random binary string (128 bits of entropy), then i hash it using SHA-256, then i take the first 128 bits of the output hash. Does the taken bit string still have (almost) 128 ...

I have a web app (a register and login system) written already but i am now improving it. One of its design goals was high security.
I have some use cases of md5 and sha1 in it and now i am in doubt ...

The Unicity Distance for the DES cipher is around $8.6$ characters, and can be calculated using the $U=H(k)/D$ formula, where $D = R - r$, and where $R = 8$ is the number of bits in a byte (ASCII is 7 ...

I've been looking into the difference between PRNGs and proper RNG techniques. One that I particularly like is the idea of tuning a radio to a certain frequency and bandwidth and just listening to the ...

Why is there a need to generate more than one high entropy seed? It would seem like if the original source of entropy is high quality, than some 512 bits should be more than enough to seed a CSPRNG ...

Here is a cartoon about password entropy. http://xkcd.com/936/
I dont quite understand how the entropy is calculated in the cartoon assuming they are calculate correctly. But in general, I dont have ...

The Von Neumann randomness extractor is explicitly mentioned in the randomness extractor page of Wikipedia, but strangely enough that page does not contain any reference to whitening the results of an ...

I'm implementing an entropy gathering program.
For that I collect 2 bits from two gpio-pins connected to a random source.
I whiten this stream of bits using the von Neumann decorrelation algorithm. ...

Assume that I have two sources of entropy (say, a hardware RNG and a CSPRNG) and that the two sources are independent (do not know anything about the internal state of the other RNG). Can I mix them ...

How would one go about generating Encryption Keys from Biometric Fingerprint Templates extracted from a fingerprint using either Griaule SDK or DigitalPersona SDK or any other SDK that will return the ...

There are many cases in maths where doing the same thing over and over again will bring you closer to a value. Derivation of polynomials is the striking example: no matter what you start with, you end ...

I want to create a brain wallet using a custom diceware since I don't like the original one. Instead of 7776 words it has 46656 because I use 6 dice for each word instead of 5, and also it only has ...

My app on Android uses the built-in motion sensors to collect seed-data for the PRNG (java.security.SecureRandom) that is later to be used for key-generation.
The user is told to shake the device so ...

I need to write some high-level security requirements which include a random number generator suitable for use in cryptography. I don't need something very formal, this isn't a security certification ...